Skip to content

FRP Intranet Penetration

taten_frp provides a shared intranet penetration service for internal team use. On February 14, 2026, team member CN059 purchased a three-year Hong Kong cloud server (8 vCPUs, 8 GB RAM, 30 Mbps bandwidth) and designated it as a shared team server. On the same day, CN059 granted sudo privileges to Xiao Lin and Xiao Xin, and deployed the frps service. Additionally, Xiao Xin also deployed a relatively complete Kubernetes service.

The FRP service was announced as available on February 14, 2026.

Clients must install frpc to utilize the team’s FRP service. For installation instructions, please refer to the official FRP documentation. Download the latest binary release of frpc from GitHub, extract the downloaded file into any directory, and then edit the frpc.toml configuration file accordingly.

For comprehensive details on configuring frpc.toml, please consult the official FRP documentation. To simplify setup, TATEN provides the following template:

# serverAddr: Enter the TATEN FRP server address
serverAddr = ""
serverPort = 7000
[auth]
# Replace with the actual token from TATEN's internal documentation
token = "token"
# Below is a complete tunnel proxy configuration example:
# name: Tunnel name
# type: Tunnel protocol type
# localIP: Local IP address to be exposed (if frpc runs on a router, specify the LAN IP of the target device)
# localPort: Local port to be exposed
# remotePort: Remote port on the FRP server
[[proxies]]
name = "Minecraft"
type = "tcp"
localIP = "127.0.0.1"
localPort = 25565
remotePort = 25565

This basic template configures FRP to forward traffic from port 25565 on the FRP server to port 25565 of the local Minecraft server (127.0.0.1:25565). Consequently, other devices can connect to your local Minecraft server via the FRP server’s public IP on port 25565, enabling multiplayer gameplay.

Launch the frpc client by executing the following command:

Terminal window
frpc -c frpc.toml

If your configuration file contains no syntax errors, you will see green-colored INFO log messages indicating that frpc has started successfully.

Create a file named frpc.service in /etc/systemd/system/ with the following content:

[Unit]
Description = FRP client
After = network.target syslog.target
Wants = network.target
[Service]
Type = simple
ExecStart = /usr/local/bin/frpc -c /etc/frp/frpc.toml
[Install]
WantedBy = multi-user.target

Run uname -m to determine your system architecture. Download the corresponding frpc binary from GitHub, extract it, and place it in /usr/local/bin/. Then, set its permissions to 755:

Terminal window
chmod 755 /usr/local/bin/frpc

(3) Place the frpc.toml configuration file

Section titled “(3) Place the frpc.toml configuration file”

Put your frpc.toml configuration file into the /etc/frp/ directory.

Reload systemd to recognize the new service:

Terminal window
sudo systemctl daemon-reload

Start the frpc service:

Terminal window
sudo systemctl start frpc

Check the service status:

Terminal window
sudo systemctl status frpc

Enable automatic startup on boot:

Terminal window
sudo systemctl enable frpc

Continuously being updated…